Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.
然而,大多数SSL部署会受到网络攻击的影响,因为这项技术普遍地都认识不清。
Network-based attacks: these attacks rely on low-level access to network packets and attempt to harm the system by altering this traffic or discovering information from these packets.
基于网络的攻击:这些攻击依赖于对网络数据包的低层访问,试图通过修改通信流或者发现这些数据包中的信息来危害系统。
The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
该盒子可防护3000中已知的基于内容和网络的威胁、22类DoS攻击及DDoS攻击。
These defenses effectively stop any attacks based on the parser making external network connections.
这些防御措施有效地阻止了基于解析器创建外部网络连接的所有攻击。
We advise protecting your network with passwords and generally adopting humanity's own security measures against any computer-based attacks before visiting Earth.
我们建议,在造访地球前请您先给自己的网路设上密码,并且请安装使用人类的安全软件以预防计算机攻击。
As well as the social network site-based attacks will increase, causing more infections.
以网站以及社会网络为基础的攻击将会增多,引起更多的感染。
To enhance the ability of defending attacks such as rotation and cropping, an algorithm based on wavelet moment modulation and neural network detection was presented.
为提高抵抗旋转和剪切攻击等的能力,提出了一种基于小波矩特征调制和神经网检测的图像水印算法。
The key idea is to take advantage of classification abilities of neural network for unknown attacks and the rule-based system for the known attacks.
主要思想是利用神经网络的分类能力来识别未知攻击,使用基于规则系统识别已知攻击。
For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.
对于当前混合型攻击层出不穷的安全威胁,传统的基于单一设备的网络安全防护技术己显得无能为力了。
However, the network user behavior management technology based on the identifying of host integrity could not identify the attacks that can avoid the host integrity checking.
但是这种基于识别主机完整性信息的网络用户行为管理技术,不能识别出具有避绕主机完整性检查的攻击行为。
The network attacks based on the source address spoofing have become one of the most grievous threats to the network security.
基于源地址欺骗的网络攻击已成为当前网络安全最主要的威胁之一。
Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situation.
在分析影响服务可用性网络攻击导致网络流量异常改变的基础上,提出了一种主机网络实时流量的安全状况评估方法。
Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situation.
在分析影响服务可用性网络攻击导致网络流量异常改变的基础上,提出了一种主机网络实时流量的安全状况评估方法。
应用推荐